Логотип exploitDog
bind:CVE-2020-37034
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-37034

Количество 2

Количество 2

nvd логотип

CVE-2020-37034

10 дней назад

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-57hm-3rjw-cqfh

10 дней назад

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-37034

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files.

CVSS3: 7.5
1%
Низкий
10 дней назад
github логотип
GHSA-57hm-3rjw-cqfh

HelloWeb 2.0 contains an arbitrary file download vulnerability that allows remote attackers to download system files by manipulating filepath and filename parameters. Attackers can send crafted GET requests to download.asp with directory traversal to access sensitive configuration and system files.

CVSS3: 7.5
1%
Низкий
10 дней назад

Уязвимостей на страницу